CySA+ Certification

Here you have the best CompTIA CS0-002 practice exam questions

  • You have 422 total questions to study from
  • Each page has 5 questions, making a total of 85 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on November 18, 2024
Question 1 of 422

Which of the following is the software development process by which function, usability, and scenarios are tested against a known set of base requirements?

    Correct Answer: C

    User acceptance testing (UAT) is the software development process by which function, usability, and scenarios are tested against a known set of base requirements. It is the final stage of testing before a software product is released to the market, designed to ensure that the software meets the needs of its intended users.

Question 2 of 422

A security analyst discovers the following firewall log entries during an incident:

Which of the following is MOST likely occurring?

    Correct Answer: B

    The log entries display multiple attempts to connect to different destination ports from the same source IP address, all with the SYN flag set and zero bytes transferred. This pattern is indicative of port scanning, where an attacker is probing various ports on the target system to find open and potentially vulnerable services. SYN scans, a type of TCP scanning, only send the SYN packet and do not complete the TCP handshake, which matches the provided log entries.

Question 3 of 422

A security analyst is revising a company's MFA policy to prohibit the use of short message service (SMS) tokens. The Chief Information Officer has questioned this decision and asked for justification. Which of the following should the analyst provide as justification for the new policy?

    Correct Answer: D

    SMS is a cleartext protocol and does not support encryption. This means that SMS messages are sent without any form of encryption, making them vulnerable to interception and eavesdropping. This inherent lack of security makes SMS an unsuitable method for multi-factor authentication in environments where data protection is critical.

Question 4 of 422

During an incident response procedure, a security analyst collects a hard drive to analyze a possible vector of compromise. There is a Linux swap partition on the hard drive that needs to be checked. Which of the following should the analyst use to extract human-readable content from the partition?

    Correct Answer: A

    The 'strings' command is used to extract sequences of printable characters from binary files, making it ideal for finding human-readable content in data that is typically not human-readable. Given the need to examine a Linux swap partition which could contain non-printable characters, 'strings' would be the appropriate tool to locate and extract readable data. The other options either do not focus on extracting human-readable content or serve a different purpose, such as creating disk images or displaying file system statistics.

Question 5 of 422

A consultant is evaluating multiple threat intelligence feeds to assess potential risks for a client. Which of the following is the BEST approach for the consultant to consider when modeling the client's attack surface?

    Correct Answer: C

    The best approach for a consultant evaluating multiple threat intelligence feeds to assess potential risks for a client is to look at attacks against similar industry peers and assess the probability of the same attacks happening. By examining similar industry peers, the consultant can gain insight into the threats and attacks that are most prevalent in that industry. This information can help assess the client's potential risks and prioritize the resources needed to mitigate those risks effectively.